π΄ 5 Tips for Keeping Your Security Team on Target π΄
π Read
via "Dark Reading: ".
In nearly every security environment, competing priorities are a constant battleground. Here's how to keep the focus on what's important.π Read
via "Dark Reading: ".
Darkreading
5 Tips for Keeping Your Security Team on Target
In nearly every security environment, competing priorities are a constant battleground. Here's how to keep the focus on what's important.
β Apple Fixes βAirDoSβ Bug That Cripples Nearby iPhones, iPads β
π Read
via "Threatpost".
Apple fixes bug that allows nearby hackers to render iPads and iPhones unusable.π Read
via "Threatpost".
Threat Post
Apple Fixes βAirDoSβ Bug That Cripples Nearby iPhones, iPads
Apple fixes bug that allows nearby hackers to render iPads and iPhones unusable.
β Serious Security Flaws Found in Childrenβs Connected Toys β
π Read
via "Threatpost".
Several toys that were tested have been found lacking authentication measures, opening them up to an array of insidious attacks.π Read
via "Threatpost".
Threat Post
Serious Security Flaws Found in Childrenβs Connected Toys
Several toys that were tested have been found lacking authentication measures, opening them up to an array of insidious attacks.
π΄ The Next Security Silicon Valley: Coming to a City Near You? π΄
π Read
via "Dark Reading: ".
The high cost of doing business in California's San Francisco Bay Area is just one factor driving infosec companies - established and and startups, alike - to pursue their fortunes elsewhere. Here's where many are going.π Read
via "Dark Reading: ".
Dark Reading
The Next Security Silicon Valley: Coming to a City Near You?
The high cost of doing business in California's San Francisco Bay Area is just one factor driving infosec companies - established and and startups, alike - to pursue their fortunes elsewhere. Here's where many are going.
β Smart Krampus-3PC Malware Targets iPhone Users β
π Read
via "Threatpost".
The malware affected 100 different online publishers.π Read
via "Threatpost".
Threat Post
Smart Krampus-3PC Malware Targets iPhone Users
The malware affected 100 different online publishers.
π How to stop spam calls right now π
π Read
via "Security on TechRepublic".
Spam calls drive us all crazy. Here are four ways to stop robocalls and other unsolicited phone calls.π Read
via "Security on TechRepublic".
TechRepublic
How to stop spam calls right now
Spam calls drive us all crazy. Here are four ways to stop robocalls and other unsolicited phone calls.
π΄ Intel Issues Fix for 'Plundervolt' SGX Flaw π΄
π Read
via "Dark Reading: ".
Researchers were able to extract AES encryption key using SGX's voltage-tuning function.π Read
via "Dark Reading: ".
Dark Reading
Intel Issues Fix for 'Plundervolt' SGX Flaw
Researchers were able to extract AES encryption key using SGX's voltage-tuning function.
π΄ Trickbot Operators Now Selling Attack Tools to APT Actors π΄
π Read
via "Dark Reading: ".
North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.π Read
via "Dark Reading: ".
Darkreading
Trickbot Operators Now Selling Attack Tools to APT Actors
North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.
π TestSSL 3.0rc6 π
π Go!
via "Security Tool Files β Packet Storm".
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TestSSL 3.0rc6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Apple iOS 13.3 is here, bringing support for keyfobby authentication β
π Read
via "Naked Security".
Bullet-proof authentication is just a tap away!π Read
via "Naked Security".
Naked Security
Apple iOS 13.3 is here, bringing support for keyfobby authentication
Bullet-proof authentication is just a tap away!
β December Patch Tuesday blunts WizardOpium attack chain β
π Read
via "Naked Security".
December 2019βs Patch Tuesday updates are, including a fix for the Windows flaw used in recently discovered WizardOpium attacks.π Read
via "Naked Security".
Naked Security
December Patch Tuesday blunts WizardOpium attack chain
December 2019βs Patch Tuesday updates are out, including a fix for the Windows flaw used in recently discovered WizardOpium attacks.
β Retail Cyberattacks Set to Soar 20% in 2019 Holiday Season β
π Read
via "Threatpost".
A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs.π Read
via "Threatpost".
Threat Post
Retail Cyberattacks Set to Soar 20% in 2019 Holiday Season
A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs.
β Your Smart Christmas Lights Are Safer Than They Were Last Year β
π Read
via "Threatpost".
Manufacturers of the Twinkly IoT-connected lights slightly boosted security by switching out the Wi-Fi module, according to Pen Test Partners.π Read
via "Threatpost".
Threat Post
Your Smart Christmas Lights Are Safer Than They Were Last Year
Manufacturers of the Twinkly IoT-connected lights slightly boosted security by switching out the Wi-Fi module, according to Pen Test Partners.
π΄ Waking Up to Third-Party Security Risk π΄
π Read
via "Dark Reading: ".
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.π Read
via "Dark Reading: ".
Darkreading
Waking Up to Third-Party Security Risk
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.
β S2 Ep20: Why donβt they send ransomware on floppies anymore? β
π Read
via "Naked Security".
New episode available now!π Read
via "Naked Security".
Naked Security
S2 Ep20: Why donβt they send ransomware on floppies anymore?
New episode available now!
π Organizations moving toward more rigorous security testing to ensure compliance π
π Read
via "Security on TechRepublic".
More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack.π Read
via "Security on TechRepublic".
TechRepublic
Organizations moving toward more rigorous security testing to ensure compliance
More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack.
π΄ Lessons from the NSA: Know Your Assets π΄
π Read
via "Dark Reading: ".
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.π Read
via "Dark Reading: ".
Dark Reading
Lessons from the NSA: Know Your Assets
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.
π΄ Smart Building Security Awareness Grows π΄
π Read
via "Dark Reading: ".
In 2020, expect to hear more about smart building security.π Read
via "Dark Reading: ".
Dark Reading
Smart Building Security Awareness Grows
In 2020, expect to hear more about smart building security.
β Brexit β even cybercriminals want to have their sayβ¦ β
π Read
via "Naked Security".
These crooks stashed a message in the virus code itelf - we found it, but we don't know which way to take it!π Read
via "Naked Security".
Naked Security
Brexit β even cybercriminals want to have their sayβ¦
These crooks stashed a message in the virus code itelf β we found it, but we donβt know which way to take it!
π΅ i2Coalition creates alliance of major VPN providers to form VPN Trust Initiative π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
i2Coalition connects major VPN providers to form VPN Trust Initiative
NordVPN, ExpressVPN, VyprVPN, and IPVanish have formed the VPN Trust Initiative within i2Coalition. It aims at improving digital security for VPN consumers.
β Maze Ransomware Behind Pensacola Attack, Data Breach Looms β
π Read
via "Threatpost".
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached. π Read
via "Threatpost".
Threat Post
Maze Ransomware Behind Pensacola Attack, Data Breach Looms
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached.